Skip to main content

2021 | OriginalPaper | Buchkapitel

3. Evolution of Applied Cryptography

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter briefly explains the evolution of applied cryptography by reflecting on its origins and its ongoing evolution. The objective of this chapter is to provide a basic insight into how applied cryptography has evolved whilst acknowledging the contributions of the inventors and security researchers that have further advanced the discipline. Indeed, applied cryptography and encryption are not the sum of one inventor or invention, they are the product of thousands of years of applied research. The final sections of the chapter explore the growing public demand for encryption and the paradox encryption creates for ransomware victims.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Note: Social media stories such as Wikileaks and Edward Snowden’s may have also played a significant role in the broader public’s use and perception of advanced encryption techniques. The use of encryption can also be commonly associated with dissidents and citizens under repressive regimes and those involved in forms of illegal activities such as drug trafficking and terrorism.
 
2
Note: Current generation decryption applications apply extensive data analytics, using the most commonly used passwords first. Statistically, this could drastically reduce the time required to discover the key in comparison to conventional accumulation-type brute-force attacks.
 
3
Note: This is the absolute theoretical maximum time frame it would take to discover all possible keys.
 
4
Note: A rainbow table is a precomputed (calculated) table for reversing cryptographic hash functions.
 
5
Note. NotPetya is a clear example of ransomware that was designed to be destructive.
 
Literatur
Zurück zum Zitat J. Daemen, V. Rijmen, The Design of Rijndael: AES – The Advanced Encryption Standard (Springer, Berlin, 1998) J. Daemen, V. Rijmen, The Design of Rijndael: AES – The Advanced Encryption Standard (Springer, Berlin, 1998)
Zurück zum Zitat S. Fluhrer, Mantin I., Shamir A., Weaknesses in the key scheduling algorithm of RC4, Paper presented at the International Workshop on Selected Areas in Cryptography. 2011 S. Fluhrer, Mantin I., Shamir A., Weaknesses in the key scheduling algorithm of RC4, Paper presented at the International Workshop on Selected Areas in Cryptography. 2011
Zurück zum Zitat L.J. Freeh, Director of the Federal of Investigations. (9 Sept 1997) [Presentation] L.J. Freeh, Director of the Federal of Investigations. (9 Sept 1997) [Presentation]
Zurück zum Zitat D. Kahn, The Codebreakers: The Story of Secret Writing (MacMillan, New York, 1967) D. Kahn, The Codebreakers: The Story of Secret Writing (MacMillan, New York, 1967)
Zurück zum Zitat A. Kerckhoffs, La cryptographie militaire. J. Sci. Milit. IX, 5–38 (1883) A. Kerckhoffs, La cryptographie militaire. J. Sci. Milit. IX, 5–38 (1883)
Zurück zum Zitat A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge, E. Kirda, Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks (Springer International Publishing, Cham, 2015) A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge, E. Kirda, Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks (Springer International Publishing, Cham, 2015)
Zurück zum Zitat S. Landau, Polynomials in the Nation’s service: Using algebra to design the advanced encryption standard. Am. Math. Mon. 111(2), 89–117 (2004)MathSciNetCrossRef S. Landau, Polynomials in the Nation’s service: Using algebra to design the advanced encryption standard. Am. Math. Mon. 111(2), 89–117 (2004)MathSciNetCrossRef
Zurück zum Zitat L. Lessig, Code and Other Laws of Cyberspace (Basic Books, New York, 1999) L. Lessig, Code and Other Laws of Cyberspace (Basic Books, New York, 1999)
Zurück zum Zitat G.E. Moore, Tech Digest. IEDM 21, 11–13 (1975) G.E. Moore, Tech Digest. IEDM 21, 11–13 (1975)
Zurück zum Zitat National Security Agency, National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information, in Committee on National Security Systems, (National Security Agency, Washington D.C., 2003) National Security Agency, National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information, in Committee on National Security Systems, (National Security Agency, Washington D.C., 2003)
Zurück zum Zitat K. Raju, Can cloud storage save you from ransomware attacks?, Info Security Magazine, 17 July 2017 (2017) K. Raju, Can cloud storage save you from ransomware attacks?, Info Security Magazine, 17 July 2017 (2017)
Zurück zum Zitat B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, New York, 1996)MATH B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, New York, 1996)MATH
Zurück zum Zitat D. Thakkar, Preventing Digital Extortion (Packt Publishing, Birmingham, 2017) D. Thakkar, Preventing Digital Extortion (Packt Publishing, Birmingham, 2017)
Zurück zum Zitat F. Winterbotham, The Ultra Secret (Weidenfeld & Nicolson, London, 1975) F. Winterbotham, The Ultra Secret (Weidenfeld & Nicolson, London, 1975)
Metadaten
Titel
Evolution of Applied Cryptography
verfasst von
Matthew Ryan
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-66583-8_3

Premium Partner